Chapter 1: The Offer
The apartment smelled like someone had burned toast and then decided to keep burning it. Kaz sat on the edge of the mattress, which doubled as a couch when he had visitors, though he hadn't had visitors in three weeks. The burner tablet rested on his knee, its cracked screen throwing a blue wash across his face.
He scrolled through a blacklisted profile, one of dozens he'd been tracking since the last job fell apart. The profile belonged to a broker who'd been moving people through the southern corridor for at least two years. Kaz had flagged him months ago, partly out of professional interest and partly out of spite. The broker had once been a colleague, back when "colleague" meant something other than "someone who might sell you out for a better rate." That man was dead now, or at least his old identity was. The profile showed a new one. Kaz wasn't sure which version was the real one anymore, and honestly, it didn't matter much.
His cash reserves were down to forty-seven credits. He'd counted them twice that morning, which was a bad sign. When you started double-checking numbers you should already know, you were either being careful or losing your edge. Kaz hoped it was the former, though the evidence kept pointing to the latter.
The tablet chimed. An encrypted message, routed through three relays before arriving at his dead-drop channel. The sender tag read "Rens," which meant nothing to anyone except Kaz, who had used that handle exactly once, four years ago, during a job in the industrial district that had gone sideways for reasons he preferred not to revisit.
The message was short. A job offer, a location, a timeline, and a wire confirmation already attached. The money was sitting in escrow, verified through a chain of shell accounts that Kaz recognized the structure of but couldn't trace to any specific owner. The payout was triple the going rate for a simple extraction.
Triple. Kaz stared at the number long enough to make sure it wasn't a formatting error. It wasn't.
He sat with the message for a while, running through the arithmetic in his head. Triple meant either the target was worth a lot, the situation was dangerous, or someone was trying to buy loyalty with money they didn't care about losing. Usually it was two of those things. Sometimes all three.
The apartment clock read 02:14. He should sleep. He should eat. He should probably shower, given the toast smell. Instead he opened the dead-drop channel and sent a single-line reply: "Talk."
Rens responded in under a minute, which meant he was already online and waiting. That was either efficiency or paranoia. Kaz had learned to assume paranoia.
The channel was a text-only dead-drop, a relay service that stored messages for a set window before auto-deleting them. No voice, no video, no way to verify the other party's physical location. It was the kind of channel Kaz had used a hundred times and trusted about as far as he could throw it, which was still further than most people in his line of work.
"Details," Kaz typed.
Rens sent them in a structured packet, the kind of organized briefing that suggested either military training or a lot of practice at looking professional. Target: Dr. Lena Wonder. Location: Helios Research Facility, capital district. Window: a three-day political summit that would pull the majority of the city's security apparatus into the convention corridor, leaving peripheral facilities under-staffed. Extraction point: unspecified, to be determined.
Kaz read through it twice. The language was clean, almost too clean. No operational jargon, no embedded codes, no secondary instructions hidden in footnotes. Just a straightforward extraction job wrapped in enough plausible detail to pass a casual review.
"Who's the client?" he typed.
The response came back after a pause. "Urgent extraction. Client requires discretion. Standard NDA applies."
Standard NDA. Kaz had seen that phrase in job offers before, always right before the job turned into something he couldn't explain to anyone afterward. He typed back: "I don't work on standard NDAs. I need a name."
Another pause. Longer this time. Kaz could almost hear the wheels turning on the other end, the quick calculation of how much to reveal without revealing too much.
"The client is a private foundation with interests in academic preservation," Rens wrote. "Dr. Wonder's research has attracted attention from parties who would prefer it remain classified. The extraction is a protective measure."
Academic preservation. Kaz had heard that phrase used to describe everything from genuine scholarship rescue operations to outright intelligence extractions. The vagueness was the problem. A client who cared about a researcher's safety would give a name, or at least a contact. A client who wanted a researcher moved quietly would use a middleman like Rens and say exactly what Rens had said.
"Triple the rate for a protective measure?" Kaz typed.
"The summit creates a narrow window. The client values speed and discretion over cost."
That was technically true. Narrow windows did command higher rates. But the summit was a public event, three days of scheduled proceedings with known security timelines. Any competent operator could have identified that window without a client pointing it out. The fact that someone had paid to have it identified for them suggested the window wasn't the only valuable piece of intelligence in the package.
Kaz let the silence sit for a moment. Rens didn't respond. Good. A person who had a rehearsed answer for every question would fill the gap immediately. The pause meant either Rens didn't have an answer or was choosing not to give one.
"Who is Dr. Wonder?" Kaz typed. "What does she research?"
"Biomedical applications. The specifics are classified under the client's NDA."
Biomedical. Classified. A woman with a doctorate who needed extracting during a political summit, backed by a client who wouldn't give a name and was paying triple for speed. Kaz had seen this shape before. It always turned out to be something worse than the description.
He typed one more question and sent it: "Is she cooperative?"
Rens answered quickly. "She is aware of the extraction and has consented."
Aware and consenting. That was supposed to be reassuring. It wasn't. People who genuinely wanted to be extracted didn't need to be told they were aware. They asked for help. They made contact. They didn't sit in a facility while a middleman arranged for someone else to come get them.
Kaz closed the channel and set the tablet on the mattress. The toast smell had gotten worse. He stood, found a window, and cracked it open. The air outside was barely better, which was typical for the outer districts, but at least it moved.
Two days passed. Kaz spent them doing the work that most people in his trade either skipped or faked, which was verification. The money trail was the first thing to check. If the payout was fabricated, the rest of the job didn't matter. If it was real, then someone with actual resources was behind this, and that changed everything.
The escrow account sat three layers deep in a chain of shell companies registered across four jurisdictions. Kaz traced each layer using tools he'd built himself over years of doing exactly this kind of work. The first shell was a logistics firm in the eastern corridor. The second was a consulting group with no employees and no physical address. The third was a holding company that owned nothing except the escrow account itself.
The money was real. It had been sitting in the account for eleven days, which meant the client had arranged the payout well in advance of contacting Rens. Eleven days of someone waiting for the right operative to come along, or the right operative to take the bait. Either way, the money was there, and it was clean enough to withdraw without triggering any financial intelligence flags. Kaz confirmed this by running the escrow through a verification service that charged two credits for a thirty-second report. The report came back green.
He spent the second day on Dr. Lena Wonder.
What he found was thin. A doctorate in biomedical sciences from a university in the western provinces, awarded roughly six years ago. A publication record that included four peer-reviewed papers, all on topics related to cellular regeneration and tissue engineering. A position at Helios Research, listed as a senior research associate. No affiliations with government agencies. No military background. No travel history beyond academic conferences.
The profile looked exactly like what a mid-level researcher's profile should look like. That was the problem.
Kaz had spent enough time in this line of work to recognize a sanitized record when he saw one. Real people left footprints. They had personal websites, social media accounts, conference recordings, interviews, emails that got leaked, photographs at events that someone uploaded to an image database. Dr. Wonder had none of that. Her existence was confined to the bare minimum: a degree, four papers, an employment record. Everything else had been scrubbed or never existed in the first place.
He ran her name through three additional databases, including one that cost him six credits to access for a single query. The results were consistent. Thin. Clean. Empty where it shouldn't be empty.
A researcher with a classified project and a client willing to pay triple for an extraction. That combination should produce a security detail worth investigating. Kaz checked the Helios facility's publicly listed security contractor and found a standard institutional firm, the kind that staffed university labs and corporate R&D offices. Nothing unusual. Nothing worth triple the rate.
He saved the results to a local file and closed the tablet. The apartment was quiet except for the hum of the ventilation unit, which had been making that sound since before he moved in and would probably make it until the building was condemned.
The facility layout came from a municipal building registry, which was a surprisingly useful resource if you knew how to navigate it. Kaz pulled the architectural plans for the Helios Research Facility and opened them on his tablet, overlaying them with public transit schedules, the summit's published security perimeters, and a power grid map he'd obtained from a utility worker he'd once helped with a problem that involved a very expensive piece of equipment and a very patient explanation of why it shouldn't be used that way.
The facility occupied a rectangular block on the eastern edge of the capital's research corridor. Three stories. Service entrance on the south side. Main entrance on the west, facing a road that would fall inside the summit's expanded security perimeter. Two loading docks on the east, both accessible from a restricted access road that connected to the freight corridor Kaz had been watching for weeks.
He marked the layout with three possible entry points. The main entrance was out immediately, buried under summit security that would treat any unauthorized approach as a direct threat. The east loading docks were theoretically accessible but sat under continuous camera coverage from two angles. That left the south service entrance, which connected to a short alley between the facility and a closed textile warehouse.
The alley was the key. Camera coverage along the perimeter fence showed a gap between two mounting points on the south side, a gap that existed because the facility's original security contractor had installed cameras at forty-meter intervals, and the building's east wing had been added later, pushing one camera out of optimal position. The gap covered roughly a six-meter stretch of fence. At walking speed, that was about eight seconds of unmonitored space. At a run, four.
Kaz ruled out the main entrance and the east docks based on camera density and guard sight lines. The south alley was the only viable approach, assuming the gap held true and the guard rotations didn't change during the summit.
He saved the annotated layout and set it aside. Three days until the summit. That gave him time to prepare, time to get into position, and time to change his mind if the preparation revealed something he didn't like.
The toolkit assembled itself over a day and a half, mostly from things Kaz already owned or could acquire without drawing attention. The thermal bypass kit came from a supply cabinet he'd raided during a job in the western districts two years ago. It was old but functional, the kind of equipment that worked reliably even when it looked like it shouldn't. He tested it on a scrap of metal from the building's fire escape, watching the cut line glow briefly before cooling. Clean. Precise. Good enough.
The forged maintenance credentials took longer. Kaz had a contact at a print shop in the industrial district who'd done work for him before, a man named Doss who asked no questions and charged double what the job was worth. The credentials looked real at a glance, which was all that mattered. They identified the bearer as a contracted maintenance technician for the Helios facility, with access to service corridors and utility rooms. Kaz had never seen the actual credentials, so he couldn't guarantee they matched the real ones, but the facility's security detail was institutional, not military. Institutional guards checked badges. Military guards checked faces.
The signal jammer was a problem. Kaz needed one small enough to carry in a jacket pocket but powerful enough to disrupt the facility's internal communications for a few minutes. He found one on a black-market listing that cost more than his remaining cash reserves, and he bought it anyway. The seller was a vendor in the eastern corridor who delivered through a locker system that required no identification. The jammer arrived in a padded envelope that smelled like motor oil. Kaz tested it in the apartment, watching his tablet's connection drop and recover in a predictable cycle. Range was limited, maybe fifteen meters at full power, but that would have to be enough.
The weapon was the last piece. A compact sidearm he'd bought years ago during a period when he'd thought he might need one regularly. It sat in a lockbox under the mattress, wrapped in cloth to prevent moisture damage. Kaz hadn't used it in over two years. He took it out, checked the magazine, cycled the slide. The mechanism moved smoothly. The gun was clean, well-maintained, and probably the most expensive thing in the apartment. He loaded a single round, re-wrapped it, and put it back.
He had enough. More than enough, actually. The toolkit represented the kind of preparation he'd used on jobs that went the way they were supposed to go, which was to say, jobs that didn't turn into something else halfway through.
Travel to the capital required a borrowed identity, which Kaz had arranged through the same network that had connected him to Rens. The identity belonged to a man named Haris Feld, a logistics coordinator for a freight company that supplied the summit with everything from catering equipment to backup generators. The credentials were legitimate enough to pass a checkpoint scan, and the freight company's manifest included a vehicle slot on the supply corridor that ran parallel to the main transit routes.
Kaz rode the freight corridor in the back of a cargo van loaded with pallets of generator fuel. The driver was a middle-aged woman who didn't speak to him and didn't ask questions, which was the ideal arrangement. The van passed through two checkpoints before reaching the capital's outer perimeter, and at each one a guard waved the manifest without reading it. Summit logistics moved fast. Nobody wanted to be the person who held up a fuel delivery.
The textile warehouse was three blocks from the facility's south service entrance, exactly where Kaz had planned to set up his forward position. It had been closed for over a year, the tenant having defaulted on a lease that the building owner apparently didn't care about collecting. The front door was unlocked. The interior was empty except for dust, a few scattered pallets, and the kind of quiet that only existed in buildings nobody had entered recently.
Kaz set up in the back room, which had a single window facing the alley between the warehouse and the facility. The window was narrow but offered a clear sightline to the south perimeter fence and the service entrance beyond it. He positioned his long-lens camera on a makeshift tripod built from a broom handle and a piece of angle iron, and began shooting.
Six hours. Kaz spent them watching the facility's security rotations through the camera's digital display, logging every movement, every pattern, every deviation from the expected schedule. The institutional security detail rotated in four-person teams, two on the perimeter and two on interior patrol. The perimeter teams followed a predictable circuit, walking the fence line from west to east and back, with stops at the main entrance and both loading docks. The interior teams moved through the ground floor and first floor, checking doors and running through what looked like a standard patrol route.
The patterns were clean. Too clean. Institutional security guards varied their routes, partly through laziness and partly through the kind of informal rotation that happened when people had been working the same shift for months. These teams moved with the precision of people who had been trained to follow a schedule exactly.
Kaz caught his first real problem during the third hour. A perimeter guard stopped at the south fence to check something on the ground, and the way he moved around it was wrong. Institutional guards checked fences by walking along them, looking for damage or tampering. This guard crouched, scanned the area behind him, then checked the fence at a specific point before standing and resuming his circuit. The crouch lasted four seconds. The scan was thorough. The whole sequence took less than twenty seconds, and it looked practiced.
Military-trained. Kaz logged the observation and kept watching.
The second problem came an hour later. A second perimeter team arrived to relieve the first, and the handoff was seamless. The outgoing team didn't stop to talk. The incoming team didn't ask questions. They simply exchanged positions at a designated point near the main entrance and continued their circuits as if the transition had been rehearsed. Institutional guard teams talked during handoffs. They shared observations, complained about the weather, asked if the coffee machine was working. These men exchanged nothing.
Two separate security layers. The visible institutional teams on the perimeter, and something underneath them that Kaz couldn't see from the warehouse window. The question was what the second layer looked like and where it operated.
He intercepted the answer during the fifth hour, when his radio scanner picked up a fragment of traffic between the facility's security detail and an outside coordination point. The transmission lasted less than three seconds, compressed and encrypted, but Kaz's scanner caught enough of the unencrypted header to identify the call sign and the frequency band. The call sign didn't match any institutional security contractor in the capital. The frequency band was military-grade, the kind of equipment that cost more than the entire institutional security detail's annual budget.
Kaz pulled up his notes and spread them across the warehouse floor. The job description from Rens described a simple extraction: get a mid-level researcher out of a facility during a summit, when security would be stretched thin. The reality he was watching was a layered military operation with external command coordination, running under the cover of a fake institutional presence.
A mid-level researcher with a thin profile didn't warrant this. Nobody with this kind of security was a mid-level researcher.
He sat on the warehouse floor with his notes spread around him, the long-lens camera still running on its broom-handle tripod, the radio scanner picking up fragments of encrypted traffic that he couldn't fully decode but didn't need to. The job Rens had described and the job Kaz was looking at were two different things wearing the same name.
He had three days before the summit. He had a toolkit that was adequate for the job he'd been sold and probably insufficient for the one he was actually in. He had forty-seven credits left and a weapon he hadn't used in two years.
The maintenance window between shift changes started in fourteen hours. Rens's intelligence package had identified it precisely, down to the minute. Kaz studied his annotated facility layout one more time, then packed his equipment and moved toward the warehouse's back exit, which opened onto the unlit service alley.
The perimeter fence rose ahead of him, topped with the kind of wire that would catch on a jacket sleeve if you tried to climb it. The camera gap sat twelve meters to his right, where the east wing's extension had pushed the mounting point out of position. Kaz could see the gap clearly in the moonlight, a dark stretch of fence between two camera housings.
He pulled the thermal bypass tool from his pack and knelt at the fence line. The wire was thin, standard security gauge, and the thermal tool cut through it with a faint hiss that he could feel more than hear. The cut was clean. He stepped through the gap, pulled the pre-cut panel from his pack, and fitted it into the breach. The panel matched the fence's mesh pattern exactly. From camera angle, the fence would look intact.
The cameras cycled back in four seconds. Kaz watched the red indicator lights on both housings flicker and stabilize, their fields of view sweeping across a fence that now showed no sign of having been opened.
His hands were steady. He made them steady. The security he'd just bypassed wasn't the security that belonged to a mid-level researcher with four published papers and a sanitized profile. It belonged to someone who could afford military-grade communications and layered operational security, and whoever that someone was, they hadn't hired Kaz to extract a scientist.
He stepped off the fence line and into the facility's grounds, moving toward the south service entrance where the maintenance window would open in fourteen hours. The building loomed ahead, dark and quiet and full of things he hadn't been told about.
Comments (0)
No comments yet. Be the first to share your thoughts!